First Technology

Since 2011, when William Ruh arrived at engineering company GE from Cisco, his role has never quite stayed the same. He explains that this is because the playbook for the role of a chief digital officer (CDO) is still being written. That’s how it once was for CIOs, as he says. “If you go back to the early days of IT, there was no CIO. [1] [1] By Sooraj Shah on CIO

First Technology

Digital transformation (DX) is about so much more than technology. It’s about using it to empower people to solve problems, innovate and connect with each other seamlessly. It’s transforming every aspect of the way we do business.

First Technology

When defining trust many believe it goes hand in hand with transparency: ‘I trust you because I know what’s going to happen’. But University of Oxford lecturer and trust expert Rachel Botsman says asking for transparency signifies that you’re in a really low-trust state. Innovation by definition is about doing something new and different. [1] [1] By Maxine-Laurie Marshall on CIO

First Technology

Consumers aren’t the only ones looking to take advantage of Black Friday and Cyber Monday as online sales boom in the run up to Christmas — cyber criminals are increasingly exploiting the holiday period in order to conduct malicious campaigns designed to conduct spear-phishing and deliver malware. [1] [1] By Danny Palmer on ZDNet

First Technology

“Augmented reality technology will provide troops with more and better information to make decisions. This new work extends our longstanding, trusted relationship with the Department of Defense to this new area,” a Microsoft spokesman said in an emailed statement. The U.S. Army and the Israeli military have already used Microsoft’s HoloLens devices in training, but plans for live combat would be a significant step forward. [1] [1] On Daily Maverick

First Technology

Malware targeting Linux users may not be as widespread as the strains targeting the Windows ecosystem, but Linux malware is becoming just as complex and multi-functional as time passes by. The latest example of this trend is a new trojan discovered this month by Russian antivirus maker Dr.Web. This new malware strain doesn’t have a distinctive name, yet, being only tracked under its generic detection name of Linux.BtcMine.174. [1] [1] By Catalin Cimpanu on ZDNet

First Technology

There’s been a lot of discussion about Apple’s T2 security chip, particularly the restrictions it places on repairs not sanctioned by Apple. The controversy centers on an Apple utility needed to make changes like swapping out the built-in SSD drives. The overall argument ties into the right-to-repair fight, allowing hardware owners to make changes to their own devices. [1] [1] By Ryan Faas on ComputerWorld

First Technology

Firefox-maker Mozilla is integrating its recently launched data-breach alert service into Firefox on the desktop. In September, Mozilla launched Firefox Monitor, which allows users to type in an email address and find out if their details are involved in any of the breaches cataloged on Australian security expert Troy Hunt’s website, Have I Been Pwned (HIBP). [1] [1] By Liam Tung on ZDNet

First Technology

Spending on robotic process automation (RPA) software is estimated to reach $680 million in 2018, according to tech analyst Gartner as companies look for ways to automate basic business tasks. This is an increase of 57 percent year over year; according to Gartner, RPA software spending is on pace to total $2.4 billion in 2022. [1] [1] By Colin Barker on ZDNet

First Technology

The current UK government has made its vision for artificial intelligence use in the NHS very clear. It wants AI, data and innovation to “transform the prevention, early diagnosis and treatment of chronic diseases by 2030”, with the UK to be “at the forefront of the use of AI and data in early diagnosis, innovation, prevention and treatment”. [1] [1] By Jo Best on ZDNet